EzCME

CrackMapExec output processor for streamlined post-exploitation analysis and reporting.

Overview

EzCME processes CrackMapExec output into structured, actionable reports. It parses raw CME output and generates organized summaries for penetration testing engagements.

Features

  • Parse CrackMapExec JSON and text output
  • Generate structured reports with credential mapping
  • Filter results by host, service, or credential status
  • Export to multiple formats

Usage

Terminal window
$ python ezcme.py -i cme_output.json -o report.html
[*] Parsing 142 entries...
[+] Report generated: report.html